Can You Pass This Toughest Microsoft Certification Exam?

62 Questions | Attempts: 249
Share

SettingsSettingsSettings
Microsoft Certification Exam Quizzes & Trivia

This is a practice exam for Microsoft Certification Exam 70-210 developed in association with ProProfs. Take this exam at the end of your studies to verify that you are prepared for the real exam. The certification exam is timed. You will have 150 minutes to complete the test. Make sure you are able to pass the practice exam by a substantial margin before you take the real exam. So, let's try out this quiz and prove your worth. All the best!


Questions and Answers
  • 1. 

    A computer operating system is responsible for all but one of the following aspects of a computer's operation. Identify the function that the OS is not responsible for.

    • A.

      Software management.

    • B.

      Data management.

    • C.

      Hardware management.

    • D.

      Memory management.

    • E.

      Revision management.

    Correct Answer
    E. Revision management.
    Explanation
    The operating system manages hardware, software, memory and data.

    Rate this question:

  • 2. 

    The operating system's ability to communicate with peripheral devices is referred to as:

    • A.

      Peripheral management.

    • B.

      Hardware management.

    • C.

      Device management.

    • D.

      Operational management.

    • E.

      Port management.

    Correct Answer
    B. Hardware management.
    Explanation
    The operating system\'s interaction with peripheral devices is called hardware management.

    Rate this question:

  • 3. 

    What is the feature of Windows 2000 that allows users to run multiple programs at the same time?

    • A.

      Dynamic memory allocation.

    • B.

      Multitasking.

    • C.

      Simultaneous memory allocation.

    • D.

      Symmetric multiprocessing.

    • E.

      Performance management .

    Correct Answer
    D. Symmetric multiprocessing.
    Explanation
    Multitasking allows Windows 2000 to run multiple applications simultaneously.

    Rate this question:

  • 4. 

    How much memory can Windows 2000 support?

    • A.

      64 megabits.

    • B.

      64 megabytes.

    • C.

      64 gigabits.

    • D.

      64 gigabytes.

    • E.

      64 terabytes.

    Correct Answer
    D. 64 gigabytes.
    Explanation
    Windows 2000 can support 64 gigabytes of memory.

    Rate this question:

  • 5. 

    What is the advantage of clustering?

    • A.

      Clustering doubles the processing power of a set of computers.

    • B.

      Clustering avoids a single point of failure.

    • C.

      Clustering doubles the memory available to a process.

    • D.

      Clustering permits multitasking.

    • E.

      Clustering triples the processing power of a cluster.

    Correct Answer
    B. Clustering avoids a single point of failure.
    Explanation
    Clustering eliminates a single point of failure. If one computer fails, another clustered computer can take its place.

    Rate this question:

  • 6. 

    Which of the following two functions do Terminal Services enable?

    • A.

      Terminal services allow a user to run client applications from a server across the network.

    • B.

      A user can run an application from the command line.

    • C.

      A system administrator can administer the server remotely.

    • D.

      A system administrator can deploy a new version of the operating system remotely.

    • E.

      A system administrator can dynamically allocate memory to a network process.

    Correct Answer(s)
    A. Terminal services allow a user to run client applications from a server across the network.
    C. A system administrator can administer the server remotely.
    Explanation
    Terminal services allow a user to run an application from a server and allow the system administrator to administer a server remotely.

    Rate this question:

  • 7. 

    You wish to control the performance of the microprocessor when a particular application is running under Windows 2000. How should you do this?

    • A.

      System Properties>Advanced>Environment Variables

    • B.

      System Properties>Advanced>Performance Options

    • C.

      System Properties>Advanced>Process Control

    • D.

      System Properties>Advanced>Speed and Performance

    • E.

      System Properties>Advanced>CPU Options

    Correct Answer
    B. System Properties>Advanced>Performance Options
    Explanation
    The Performance options, under the Advanced Tab of System Properties will allow you to control the behavior of the microprocessor.

    Rate this question:

  • 8. 

    You are a network administrator and you have several tasks that you normally perform. How can you automate the execution of these tasks in Windows 2000?

    • A.

      Write a shell script and run it manually.

    • B.

      Run the Automate Task Wizard.

    • C.

      Use the Scheduled Tasks tool.

    • D.

      Create a script that runs each time time computer is booted.

    • E.

      Create a batch file.

    Correct Answer
    C. Use the Scheduled Tasks tool.
    Explanation
    The Scheduled Tasks tool will schedule any application to run at a particular time. Tasks can be scheduled to run once, or they can be run regularly.

    Rate this question:

  • 9. 

    How many processors on SMP systems can Windows 2000 Advanced Server support?

    • A.

      2

    • B.

      4

    • C.

      8

    • D.

      16

    • E.

      32

    Correct Answer
    C. 8
    Explanation
    Windows 2000 Advanced Server can support systems with up to eight processors.

    Rate this question:

  • 10. 

    Which version of Windows 2000 is ideal for online transaction processing?

    • A.

      Windows 2000 Datacenter Server.

    • B.

      Windows 2000 Advanced Server.

    • C.

      Windows 2000 Professional.

    • D.

      Windows XP Professional.

    • E.

      Windows 2000 E-Commerce Server.

    Correct Answer
    A. Windows 2000 Datacenter Server.
    Explanation
    Windows 2000 Datacenter Server is designed to process large volumes of online transactions.

    Rate this question:

  • 11. 

    What type of network server can store large amounts of data in a central location and allow users to retrieve only the data they\'re interested in?

    • A.

      A file server.

    • B.

      A database server.

    • C.

      A storage area network.

    • D.

      A print server.

    • E.

      A local storage server.

    Correct Answer
    B. A database server.
    Explanation
    A database server allows users to retrieve information from a database without downloading the entire database.

    Rate this question:

  • 12. 

    What type of network server stores information about network users and permits centralized management of users?

    • A.

      A Network Management server.

    • B.

      A Network Access server.

    • C.

      A User Management server.

    • D.

      A Directory Services server.

    • E.

      An Active Desktop server.

    Correct Answer
    D. A Directory Services server.
    Explanation
    A Directory Services server is a centralized store of information about the network, network users, and their access to files and resources on the network.

    Rate this question:

  • 13. 

    What are the three major responsibilities of the network operating system?

    • A.

      Providing connectivity to networked devices.

    • B.

      Ensuring communication between devices

    • C.

      Running applications.

    • D.

      Providing equitable access for all users to shared network devices.

    • E.

      Providing access control for resources and information on the network.

    Correct Answer(s)
    A. Providing connectivity to networked devices.
    B. Ensuring communication between devices
    E. Providing access control for resources and information on the network.
    Explanation
    A network operating system ensures that communication between networked users takes place; provides physical and logical pathways to networked devices; and ensures that access to data and resources is properly granted or restricted.

    Rate this question:

  • 14. 

    What is the primary purpose of Active Directory?

    • A.

      Active Directory stores and organizes information about domain resources.

    • B.

      Active Directory stores hardware profiles for network devices.

    • C.

      Active Directory stores user files.

    • D.

      Active Directory provides lookup services for the email server.

    • E.

      Active Directory manages user desktops.

    Correct Answer
    A. Active Directory stores and organizes information about domain resources.
    Explanation
    Active Directory stores information about domain resources and provides a hierarchical organization for domains.

    Rate this question:

  • 15. 

    How do you log onto a computer running Windows 2000?

    • A.

      Select the Start button.

    • B.

      Press CTRL+ALT+DEL.

    • C.

      Press CTRL, then ALT, then DEL .

    • D.

      Press ESC twice .

    • E.

      Press SHIFT+TAB.

    Correct Answer
    B. Press CTRL+ALT+DEL.
    Explanation
    Press CTRL+ALT+DEL. This will display the logon dialog box.

    Rate this question:

  • 16. 

    In Windows 2000, how can you determine whether your computer belongs to a domain or a workgroup?

    • A.

      Right-click on My Computer and select Properties>System Properties>Network Identification

    • B.

      Right-click on My Computer and Select Properties>Domains

    • C.

      Right-click on My Computer>About This Computer

    • D.

      Right-click on My Computer>System Properties>Domains

    • E.

      Right-click on My Computer>System Properties>Workgroups

    Correct Answer
    A. Right-click on My Computer and select Properties>System Properties>Network Identification
    Explanation
    Right-click on My Computer and select Properties>System Properties>Network Identification. This will provide information about the computer, including whether it is part of a domain or workgroup.

    Rate this question:

  • 17. 

    Identify three critical functions performed by the network administrator.

    • A.

      Monitoring network resources and events.

    • B.

      Maintaining system integrity.

    • C.

      Performing application upgrades.

    • D.

      Performing backups and restorations.

    • E.

      Installing middleware upgrades.

    Correct Answer(s)
    A. Monitoring network resources and events.
    B. Maintaining system integrity.
    D. Performing backups and restorations.
    Explanation
    Network administrators are usually responsible for monitoring the network; maintaining the integrity of the network by keeping it free of viruses and other security threats; and performing regular backups and restorations.

    Rate this question:

  • 18. 

    You are looking for a comprehensive display of information about a computer running Windows 2000. Where can you find this information?

    • A.

      Control Panel>Administrative Tools>Computer Management>System Tools>System Performance

    • B.

      Control Panel>Administrative Tools>Computer Management>System Tools>About this Computer

    • C.

      Control Panel>Administrative Tools>Computer Management>System Tools>System Overview

    • D.

      Control Panel>Administrative Tools>Computer Management>System Tools>System Information

    • E.

      Control Panel>Administrative Tools>Computer Management>System Tools>System Check

    Correct Answer
    A. Control Panel>Administrative Tools>Computer Management>System Tools>System Performance
    Explanation
    System Information provides a comprehensive overview of the hardware, operating system components, and software installed on a particular computer.

    Rate this question:

  • 19. 

    In Windows 2000, which actions would generate an auditing event?

    • A.

      An invalid logon attempt.

    • B.

      A file error.

    • C.

      A valid logon attempt.

    • D.

      Failure of a system component to load at startup.

    • E.

      The creation of a file.

    Correct Answer(s)
    A. An invalid logon attempt.
    C. A valid logon attempt.
    E. The creation of a file.
    Explanation
    Auditing events include valid and invalid logon attempts; file creation, file opening and file deletion.

    Rate this question:

  • 20. 

    Identify three of the functions of the Performance Logs and Alerts utility in Windows 2000.

    • A.

      Collect performance information and compare it with performance information from other computers.

    • B.

      Collect and archive performance data.

    • C.

      Set sampling intervals for hardware and system resources.

    • D.

      Create reusable monitoring configurations for networked computers.

    • E.

      Configure notifications to alert the system administrator of certain operating conditions.

    Correct Answer(s)
    B. Collect and archive performance data.
    C. Set sampling intervals for hardware and system resources.
    E. Configure notifications to alert the system administrator of certain operating conditions.
    Explanation
    Performance Logs and Alerts will allow performance data to be collected and archived; will permit the configuration of the sampling interval for data collection; and will permit the configuration of notification messages when certain limits or thresholds have been reached.

    Rate this question:

  • 21. 

    You have installed a new computer on your network. The Windows 2000 computers on the network do not have the new printer driver installed. What will happen when a Windows 2000 user tries to use the new printer?

    • A.

      Windows 2000 will download the proper driver when a client connects to the print server.

    • B.

      The Windows 2000 user will not be able to use the new printer until a driver is downloaded and installed.

    • C.

      The printer will not work.

    • D.

      The print server will redirect the print job to a printer for which the Windows 2000 computer has an installed driver.

    • E.

      The print server will use a generic print driver if the correct one cannot be found.

    Correct Answer
    A. Windows 2000 will download the proper driver when a client connects to the print server.
    Explanation
    Windows 2000 will automatically download the new driver when a client connects to the print server.

    Rate this question:

  • 22. 

    You would like to set a security policy on one computer on the network. How can you do this using Windows 2000?

    • A.

      Place the computer in its own domain and set a domain security policy for it.

    • B.

      Set up a local security policy for the computer.

    • C.

      Remove the computer from the domain and use it in a workgroup configuration.

    • D.

      Set up a system security policy for the users on the computer.

    • E.

      Change the permissions for all users who use that computer.

    Correct Answer
    B. Set up a local security policy for the computer.
    Explanation
    You can set up a local security policy for an individual computer using the Local Security Policy option under Administrative Tools.

    Rate this question:

  • 23. 

    How can you monitor a dial-up connection in Windows 2000?

    • A.

      Use the Dial Up Networking Tool.

    • B.

      Select Modems in the Device Manager.

    • C.

      Use the Dial-up Monitor Tool in the Control Panel.

    • D.

      Use the Network and Dial-up Connections tool in the Control Panel.

    • E.

      Use the Network Connections Tool in the Control Panel.

    Correct Answer
    D. Use the Network and Dial-up Connections tool in the Control Panel.
    Explanation
    The Network and Dial-up Connections Tool in the Control Panel will allow you to monitor dial-up connections.

    Rate this question:

  • 24. 

    Which statement about the Administrator account is true?

    • A.

      Administrators should use the administrator account for ordinary user tasks on a local computer.

    • B.

      The Administrator account on a computer running Windows 2000 Professional cannot be deleted or disabled.

    • C.

      The Administrator account on a computer running Windows 2000 Professional cannot be deleted but it may be disabled.

    • D.

      The only way to disable the Administrator account on a computer running Windows 2000 Professional is to delete it.

    • E.

      The Administrator account serves as the default for local user accounts on Windows 2000 Professional.

    Correct Answer
    B. The Administrator account on a computer running Windows 2000 Professional cannot be deleted or disabled.
    Explanation
    Windows 2000 requires an Administrator account to operate.Therefore, the Administrator Account on a computer running Windows 2000 Professional cannot be deleted or disabled.

    Rate this question:

  • 25. 

    The Local Users and Groups Utility in Windows 2000 can do all but one of the following:

    • A.

      Create and delete user accounts.

    • B.

      Modify user account information.

    • C.

      Reset the password for the account.

    • D.

      Increase the disk space allocated to a user.

    • E.

      Enable and disable local user accounts.

    Correct Answer
    D. Increase the disk space allocated to a user.
    Explanation
    The Local Users and Groups utility cannot be used to increase the amount of disk space dedicated to a particular user.

    Rate this question:

  • 26. 

    On a domain controller, where are groups stored?

    • A.

      A group is stored on the domain controller\'s SAM.

    • B.

      On a domain controller, a group is stored in Active Directory.

    • C.

      A group is stored in the local user database of the domain controller.

    • D.

      A group is stored in the group database in the domain controller.

    • E.

      A group is stored in the local security database of the domain controller.

    Correct Answer
    B. On a domain controller, a group is stored in Active Directory.
    Explanation
    On a Windows 2000 Professional computer that is acting as a domain controller, groups are stored in Active Directory.

    Rate this question:

  • 27. 

    Which of the following two statements are true about the Power Users group in Windows 2000 Professional?

    • A.

      The Power Users group is automatically created only on Windows 2000 Professional local computers.

    • B.

      The Power Users group is granted unlimited Administrator rights.

    • C.

      Power Users group members are granted limited administrative rights.

    • D.

      Power Users is a built in group on all computers running Windows 2000, whether or not they are domain controllers.

    • E.

      Power Users group members cannot create shared resources on a domain controller.

    Correct Answer(s)
    A. The Power Users group is automatically created only on Windows 2000 Professional local computers.
    C. Power Users group members are granted limited administrative rights.
    Explanation
    The Power Users group is automatically created only on local computers running Windows 2000 Professional. Power Users are granted a limited number of administrative rights.

    Rate this question:

  • 28. 

    Which of the following two statements are true about the Backup Operators group in Windows 2000 Professional?

    • A.

      The Backup Operators group can backup and restore files, regardless of the permissions on the file.

    • B.

      The Backup Operators group is automatically created only on Windows 2000 Professional local computers.

    • C.

      The Backup Operators group can backup and restore files, only on files for which they have read and write permissions.

    • D.

      Backup Operators group members can alter the security settings of a computer running Windows 2000.

    • E.

      Backup Operators is a built in group on all computers running Windows 2000, whether or not they are domain controllers.

    Correct Answer(s)
    A. The Backup Operators group can backup and restore files, regardless of the permissions on the file.
    E. Backup Operators is a built in group on all computers running Windows 2000, whether or not they are domain controllers.
    Explanation
    The Backup Operators group is automatically created on all computers running Windows 2000 Professional. Backup Operators can back up and restore files regardless of the state of the permissions on the file.

    Rate this question:

  • 29. 

    Two computers are connected together by a high speed connection within an office. What type of network does this situation describe?

    • A.

      A workgroup.

    • B.

      A domain.

    • C.

      A local area network.

    • D.

      A wide area network.

    • E.

      A storage area network.

    Correct Answer
    C. A local area network.
    Explanation
    The question describes a local area network.

    Rate this question:

  • 30. 

    Three different branch offices are connected by leased high speed data lines that run between the buildings. What type of network does this describe?

    • A.

      A workgroup.

    • B.

      A domain.

    • C.

      A local area network.

    • D.

      A wide area network.

    • E.

      A storage area network.

    Correct Answer
    D. A wide area network.
    Explanation
    The question describes a wide area network.

    Rate this question:

  • 31. 

    Which two of the following statements describes Frame Relay?

    • A.

      Frame relay uses fixed length packets.

    • B.

      Frame Relay is ideally suited to support real time traffic, such as video over IP.

    • C.

      Frame Relay uses variable length packets.

    • D.

      Frame Relay has a maximum transmission speed of 10 Mbps.

    • E.

      Frame Relay is a service provided by telecommunications carriers.

    Correct Answer(s)
    C. Frame Relay uses variable length packets.
    E. Frame Relay is a service provided by telecommunications carriers.
    Explanation
    Frame Relay is a technology provided by telecommunications carriers, that is used primarily for WANs. It uses variable length packets.

    Rate this question:

  • 32. 

    Which network device forwards packets directly to their destination or to another network segment, uses complete addressing and improves the efficiency of the network?

    • A.

      A router.

    • B.

      A bridge.

    • C.

      A switch.

    • D.

      A hub.

    • E.

      A repeater.

    Correct Answer
    A. A router.
    Explanation
    A router forwards packets directly to their destination or to another network segment, uses complete addressing and improves the efficiency of the network.

    Rate this question:

  • 33. 

    Identify three advantages of using TCP/IP networks.

    • A.

      TCP/IP is an industry standard.

    • B.

      TCP/IP allows dissimilar operating systems to connect and communicate.

    • C.

      TCP/IP is designed for LAN communications.

    • D.

      TCP/IP scales well to accommodate both small and large networks.

    • E.

      TCP/IP is non-routable.

    Correct Answer(s)
    A. TCP/IP is an industry standard.
    B. TCP/IP allows dissimilar operating systems to connect and communicate.
    D. TCP/IP scales well to accommodate both small and large networks.
    Explanation
    TCP/IP is the industry standard for communication between networks and applications. TCP/IP is not proprietary, so it is used by many dissimilar operating systems and networks. TCP/IP can accommodate both small and large networks.

    Rate this question:

  • 34. 

    TCP/IP based communications use a four layer communications model to describe their operations. Identify the layer that is responsible for addressing, packaging and delivering the data being transmitted.

    • A.

      The Internet Layer

    • B.

      The Presentation Layer

    • C.

      The Network Interface Layer

    • D.

      The Transport Layer

    • E.

      The Application Layer

    Correct Answer
    A. The Internet Layer
    Explanation
    The Internet Layer is responsible for addressing, packaging and delivering data being shared by computers across a network. This includes all of the control traffic, like acknowledgement requests and responses.

    Rate this question:

  • 35. 

    TCP/IP based communications use a four layer communications model to describe their operations. Identify the layer that is responsible for putting data on and taking data off the network.

    • A.

      The Internet Layer

    • B.

      The Presentation Layer

    • C.

      The Network Interface Layer

    • D.

      The Transport Layer

    • E.

      The Application Layer

    Correct Answer
    C. The Network Interface Layer
    Explanation
    The Network Interface Layer is responsible for moving traffic onto and off of the network. This layer includes standards for the physical connections needed for data transmission.

    Rate this question:

  • 36. 

    In TCP/UDP communications, what service can be found on port 25?

    • A.

      FTP

    • B.

      Telnet

    • C.

      SMTP

    • D.

      HTTP

    • E.

      NNTP

    Correct Answer
    C. SMTP
    Explanation
    SMTP can be found on port 25.

    Rate this question:

  • 37. 

    Which utility in Windows 2000 Professional would you use to view TCP/IP protocol session information?

    • A.

      Hostname

    • B.

      Ipconfig

    • C.

      Nbstat

    • D.

      Netstat

    • E.

      Ping

    Correct Answer
    D. Netstat
    Explanation
    The Netstat utility reports TCP/IP protocol session information.

    Rate this question:

  • 38. 

    Formerly, IP addresses were divided into classes. Each class of IP address determined how many hosts a network could support and each class range was determined by the network address. Identify the range of addresses that includes Class B networks.

    • A.

      1.0.0.0 - 126.255.255.255

    • B.

      128.0.0.0- 191.255.255.255

    • C.

      192.0.0.0 - 223.255.255.255

    • D.

      224.0.0.0 - 239.255.255.255

    • E.

      240.0.0.0 - 255.255.255.254

    Correct Answer
    B. 128.0.0.0- 191.255.255.255
    Explanation
    129.0.0.0- 191.255.255.255 identify networks that were formerly designated as Class B addresses.

    Rate this question:

  • 39. 

    Formerly, IP addresses were divided into classes. Each class of IP address determined how many hosts a network could support and each class range was determined by the network address. Identify the range of addresses that includes Class C networks.

    • A.

      1.0.0.0 - 126.255.255.255

    • B.

      128.0.0.0- 191.255.255.255

    • C.

      192.0.0.0 - 223.255.255.255

    • D.

      224.0.0.0 - 239.255.255.255

    • E.

      240.0.0.0 - 255.255.255.254

    Correct Answer
    C. 192.0.0.0 - 223.255.255.255
    Explanation
    192.0.0.0 - 223.255.255.255 identify networks that were formerly designated as Class C addresses.

    Rate this question:

  • 40. 

    How many addresses will a Class C network provide?

    • A.

      16,777,216

    • B.

      8,388,608

    • C.

      65,536

    • D.

      32,768

    • E.

      256

    Correct Answer
    E. 256
    Explanation
    A Class C network address block will provide 256 IP addresses.

    Rate this question:

  • 41. 

    Regardless of the size of the address block, two IP addresses are always reserved by convention. Identify the reserved addresses.

    • A.

      .1 and .255 are always reserved as the network start and end identifiers. .

    • B.

      0 and .255 are always reserved as the network and broadcast addresses.

    • C.

      0 and .1 are always reserved as the network and router addresses.

    • D.

      .1 and .2 are always reserved for the router and the firewall.

    • E.

      .1 and .42 are always reserved for the router and the DNS server.

    Correct Answer
    B. 0 and .255 are always reserved as the network and broadcast addresses.
    Explanation
    In any IP network, addresses .0 and .255 are always reserved as the network and broadcast addresses. These addresses cannot be assigned to hosts.

    Rate this question:

  • 42. 

    If a Windows 2000 Professional computer is configured to obtain a DHCP address, but the DHCP server cannot be found, what does Windows 2000 do?

    • A.

      It will continue to look for a DHCP server. Meanwhile, network services will be unavailable.

    • B.

      It will renew the lease on the most recent network address it obtained from the DHCP server.

    • C.

      It will give up. The user must manually get a DHCP address once the DHCP server is available again.

    • D.

      Windows 2000 Professional will assign a private adress from the 169.254.0.0/24 network range.

    • E.

      Windows 2000 Professional will select a network address at random.

    Correct Answer
    D. Windows 2000 Professional will assign a private adress from the 169.254.0.0/24 network range.
    Explanation
    Windows 2000 Professional will assign a private adress from the 169.254.0.0/24 network range, however DNS, WINS, and a default gateway information are not assigned.

    Rate this question:

  • 43. 

    Which utility does Windows 2000 Professional provide to assist you with converting octal numbers to binary?

    • A.

      Calculator has a Scientific feature that will convert octal to binary.

    • B.

      Windows 2000 Professional does not provide any utilities, however several free utilities are available for download.

    • C.

      The Convert utility will convert octal to binary and vice versa.

    • D.

      The Octal utility will convert octal to binary, hexidecimal and decimal.

    • E.

      BaseConverter will convert a number in any base to a number in any other base.

    Correct Answer
    A. Calculator has a Scientific feature that will convert octal to binary.
    Explanation
    Calculator has a scientific feature that will permit conversion between octal and binary.

    Rate this question:

  • 44. 

    You need to filter client requests to limit traffic to certain sites from your network. What is the best way to do this?

    • A.

      Use a proxy server.

    • B.

      Use a content filtering service.

    • C.

      Use a firewall.

    • D.

      Configure the router to drop packets to disallowed sites.

    • E.

      Install content filters on each workstation.

    Correct Answer
    A. Use a proxy server.
    Explanation
    A proxy server will allow you to control traffic on your network, and filter client requests.

    Rate this question:

  • 45. 

    You are the administrator of a Windows 2000 network with 8 workstations and one Windows 2000 server but your organization may do a large expansion sometime in the next year. Which licensing mode should you select for your Windows 2000 Server?

    • A.

      Per seat. Your expansion plans will be covered regardless of when they occur.

    • B.

      Per seat. It is much less expensive to pay on a per-seat basis.

    • C.

      Per server. You can change your licensing mode once from Per Server to Per Seat, but you cannot change from Per Seat to Per Server.

    • D.

      Per Seat. You can change your licensing mode once from Per Seat to Per Server but you cannot change from Per Server to Per Seat.

    • E.

      Neither. If you only have one Windows 2000 Server, you do not need Client Access Licenses.

    Correct Answer
    C. Per server. You can change your licensing mode once from Per Server to Per Seat, but you cannot change from Per Seat to Per Server.
    Explanation
    Per server. You can change your licensing mode once from Per Server to Per Seat, but you cannot change from Per Seat to Per Server.

    Rate this question:

  • 46. 

    You would like to check the frame type on your configuration of NWLink. What command will provide this information?

    • A.

      Ipconfig

    • B.

      Ipconfig -f

    • C.

      Ipxroute config

    • D.

      Iproute config

    • E.

      Ipconfig -frametype

    Correct Answer
    C. Ipxroute config
    Explanation
    ipxroute config will allow you to verify the frame type for NWLink.

    Rate this question:

  • 47. 

    Identify three requirements for user names in Windows 2000.

    • A.

      User names must be unique in Active Directory.

    • B.

      User names cannot exceed eight characters.

    • C.

      User names must contain both uppercase and lowecase characters.

    • D.

      User names must be alphanumeric.

    • E.

      User names cannot exceed 20 characters.

    Correct Answer(s)
    A. User names must be unique in Active Directory.
    D. User names must be alphanumeric.
    E. User names cannot exceed 20 characters.
    Explanation
    User names must be unique. Also, they cannot exceed 20 alphanumeric characters in length.

    Rate this question:

  • 48. 

    Identify three considerations when setting up a central location for users to store their home folders.

    • A.

      It will be your responsibility to provide backup and restore capabilities.

    • B.

      You must provide enough storage space on the central store.

    • C.

      Users will store very large files in a central store, whereas if they were required to keep files on their own disks, they would not save as much information.

    • D.

      You can reduce the size of the local hard drive if you use a central file store.

    • E.

      Network performance may change if you have many users attempting to access the central store at the same time.

    Correct Answer(s)
    A. It will be your responsibility to provide backup and restore capabilities.
    B. You must provide enough storage space on the central store.
    E. Network performance may change if you have many users attempting to access the central store at the same time.
    Explanation
    You must be able to backup and restore user files if you create a space for these on the network. Additionally, you must maintain enough disk space to hold user files. Finally, your network performanace may change, especially if you have many users on your network.

    Rate this question:

  • 49. 

    Identify the two different group types in Active Directory.

    • A.

      User groups.

    • B.

      Security groups.

    • C.

      Power User groups.

    • D.

      Broadcast groups.

    • E.

      Distribution groups.

    Correct Answer(s)
    B. Security groups.
    E. Distribution groups.
    Explanation
    Security groups and distribution groups are the two group types in Active Directory.

    Rate this question:

  • 50. 

    Identify the three group scopes in Active Directory.

    • A.

      Global group scope.

    • B.

      Local group scope.

    • C.

      Domain local group scope.

    • D.

      Universal group scope.

    • E.

      Limited group scope.

    Correct Answer(s)
    A. Global group scope.
    C. Domain local group scope.
    D. Universal group scope.
    Explanation
    Global, domain local, and universal group scopes exist in Active Directory.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 27, 2006
    Quiz Created by
    Eileen

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.